Business process management: a comprehensive survey

WMP Van der Aalst - International Scholarly Research Notices, 2013 - Wiley Online Library
Business Process Management (BPM) research resulted in a plethora of methods,
techniques, and tools to support the design, enactment, management, and analysis of …

Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

A role-based access control model and reference implementation within a corporate intranet

DF Ferraiolo, JF Barkley, DR Kuhn - ACM Transactions on Information …, 1999 - dl.acm.org
This paper describes NIST's enhanced RBAC model and our approach to designing and
implementing RBAC features for networked Web servers. The RBAC model formalized in …

TRBAC: A temporal role-based access control model

E Bertino, PA Bonatti, E Ferrari - Proceedings of the fifth ACM workshop …, 2000 - dl.acm.org
Role-based access control (RBAC) models are receiving increasing attention as a
generalized approach to access control. Roles can be active at certain time periods and non …

The ARBAC97 model for role-based administration of roles

R Sandhu, V Bhamidipati, Q Munawer - ACM Transactions on …, 1999 - dl.acm.org
In role-based access control (RBAC), permissions are associated with roles' and users are
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …

访问控制模型研究进展及发展趋势

李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …

A generalized temporal role-based access control model

JBD Joshi, E Bertino, U Latif… - IEEE transactions on …, 2005 - ieeexplore.ieee.org
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …

Towards comprehensive support for organizational mining

M Song, WMP Van der Aalst - Decision support systems, 2008 - Elsevier
Process mining has emerged as a way to analyze processes based on the event logs of the
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …

Access control in collaborative systems

W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …

Configurable multi-perspective business process models

M La Rosa, M Dumas, AHM Ter Hofstede… - Information Systems, 2011 - Elsevier
A configurable process model provides a consolidated view of a family of business
processes. It promotes the reuse of proven practices by providing analysts with a generic …